In some embodiments, techniques for computer security comprise detecting an attempt of a traversal associated with a link and a link destination, receiving an intended destination, comparing the intended destination and the link destination, and interfering with the traversal, if it is determined that the intended destination is substantially dissimilar to the link destination. In some embodiments, techniques for computer security comprise detecting a link associated with a document, determining a second link associated with a predetermined address and with the link, and rewriting the link including the second link.
展开▼